Security breaches can have serious, measurable consequences: lost revenue, downtime, damage to reputation, damage to IT assets, theft of proprietary or customer information, cleanup and restoration costs, and potential litigation costs. Additionally, an IT organization should be able to quickly prove that their resources are under appropriate access control and critical information has not been tampered. To help reduce these risks and operational costs, security organizations want the capability to identify attacks quickly, react swiftly, and provide a platform that quickly reports on the security status of the network and resources.

IBM Tivoli Security Information and Event Manager automates many of the repetitive, time and expertise-intensive activities required for effective security and compliance operations. The result is an efficient, cost-effective approach to security operations.

Tivoli Security information and Event Manager offers a robust enterprise audit dashboard, in contrast to solutions that only collect native logs or ones that cannot link operational data to the policy-based analysis that auditors need. From this dashboard, Chief Information Security Officers (CISOs) and auditors obtain a single view of relevant activities in the enterprise.

At a glance, they can see how much activity has been logged and compare users' profiles with the information they are accessing. This enterprise audit dashboard draws on the W7 methodology, enabling your users to interpret native log data using easily understood language, for example, who, did what, on what, when, where, where from, and where to.

The enterprise audit dashboard also helps you view policy violations over time. Additionally, you can leverage log databases that help you meet varying reporting and compliance requirements to address the needs of your business. For example, you may want log databases to be structured by department or technology type.

Furthermore, Tivoli Security Information and Event Manager offers an "at a glance" log continuity report that helps you to demonstrate to auditors that you collect each and every log as promised.

Technical Specifications

Specifications are provided by the manufacturer. Refer to the manufacturer for an explanation
of the print speed and other ratings.